US9674705B2 - Method and system for secure peer-to-peer mobile communications - Google Patents

Method and system for secure peer-to-peer mobile communications Download PDF

Info

Publication number
US9674705B2
US9674705B2 US15/136,733 US201615136733A US9674705B2 US 9674705 B2 US9674705 B2 US 9674705B2 US 201615136733 A US201615136733 A US 201615136733A US 9674705 B2 US9674705 B2 US 9674705B2
Authority
US
United States
Prior art keywords
secure
user
token
mobile communications
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US15/136,733
Other versions
US20160316367A1 (en
Inventor
Kenneth Hugh Rose
Mark Stanley Krawczewicz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tocreo Labs LLC
Original Assignee
Kenneth Hugh Rose
Mark Stanley Krawczewicz
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kenneth Hugh Rose, Mark Stanley Krawczewicz filed Critical Kenneth Hugh Rose
Priority to US15/136,733 priority Critical patent/US9674705B2/en
Publication of US20160316367A1 publication Critical patent/US20160316367A1/en
Application granted granted Critical
Publication of US9674705B2 publication Critical patent/US9674705B2/en
Assigned to TOCREO LABS, L.L.C. reassignment TOCREO LABS, L.L.C. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KRAWCZEWICZ, MARK STANLEY, ROSE, KENNETH HUGH
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive loop type
    • H04B5/0025Near field system adaptations
    • H04B5/0037Near field system adaptations for power transfer
    • H04B5/77
    • H04B5/79
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • H04W4/008
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • H04L2209/127Trusted platform modules [TPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Abstract

A system and method for secure peer-to-peer mobile communications using cryptographic mobile unlock tokens (“CK tokens”) in conjunction with mobile devices. Each CK token integrates an entire cryptosystem. Executing these cryptographic based functions entirely in the token have significant operational advantages over the typically memory-only tokens. A more secure, scalable, and lower overall system cost are just a few advantages of the CK token over executing these functions within the smartphone. Of the many uses discussed for the CK token, mobile phone enabling, stored value and medical applications, most have centered on the use of the card in conjunction with a smartphone as the touch point in the transaction.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS
The present application claims the benefit of the filing date of U.S. Provisional Patent Application Ser. No. 62/151,054 filed by the present inventors on Apr. 22, 2015.
The aforementioned provisional patent application is hereby incorporated by reference in its entirety.
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
None.
BACKGROUND OF THE INVENTION
Field of the Invention
The present invention relates to tokens for unlocking secure systems or data. More specifically, the present invention relates to a method and system for secure peer-to-peer mobile communications.
Brief Description of the Related Art
A variety of systems and methods for secure authentication using a token have been used in the past. Such smart tokens may be in the form of smartcards, USB tokens or other forms. Conventional smartcards typically are credit-card sized and made out of flexible plastic such as polyvinyl chloride. Smartcards have been used in a wide variety of applications, such as identification badges, membership cards, credit cards, etc. Conventional USB token are typically small and portable and may be of any shape. They are embedded with a micromodule containing a silicon integrated circuit with a memory and a microprocessor.
Traditional plastic card ID credentials rely on printed inks and tamper evident materials like holograms, printed static 2D barcodes, and passwords for security and to protect user data from modifications. To verify these traditional cards, readers employ multimodal optical and wavelength sensors in an attempt to verify a user's identity printed on the card.
Smartcards can be either “contact” or “contactless.” Contact cards typically have a visible set of gold contact pads for insertion into a card reader. Contactless cards use radio frequency signals to operate. Other smart tokens connect to other devices through a USB or other communications port.
Smart cards typically may have information or artwork printed on one or both sides of the card. Since smart cards are typically credit card sized, the amount of information that may be displayed on a smartcard is typically limited. A number of efforts have been made to increase the amount of data that may be displayed on a smartcard. For example, U.S. Pat. No. 7,270,276 discloses a multi-application smartcard having a dynamic display portion made, for example, of electronic ink. The display on that card changes from a first display to a second display in response to an application use of the smartcard. Another example is U.S. Patent Publication Serial No. US2005/0258229, which disclosed a multi-function smartcard (also known as an “integrated circuit card” or “IC card”) with the ability to display images on the obverse side of the card.
A display of images on a flexible display within a card typically implements an active pixel matrix display type display which has the ability to show 8 or more degrees of gray scale on each pixel. The two dimensional array of these gray scale pixels generate an image of a cardholder face. A segmented type flexible display has only two states (black or white). A group of seven segments will comprise any single digit number whereas a group of 14 segments will denote any alphabetic or numeric letter or digit. The display and control circuitry is much more simplistic for segmented displays than for active matrix displays. The present application addresses only segmented flexible bi-state displays for secure ID credentials.
Access control stations typically located on the boundary of the security area or building use some method to verify or authenticate the uses who are allowed access. The general methods to authenticate include one or more of the following defined as 1, 2, or 3 factor authentication:
    • 1. What you have—a card or ID machine or visually checked by a guard
    • 2. What you know—a password typed into a keypad
    • 3. What you are—a physical biometric attribute comparing a pre-stored “template”
to a live scan using some hardware at the access control station
There are many shortfalls and added system complexities for implementing these access control methods like; user data must be stored on a database or within the card securely, cards can be duplicated or lost, passwords can be hacked, biometrics are difficult and costly to store and scale to larger access control networks.
More recently, biometric thumb drive tokens and smartcards have proven ineffective and non-secure. These shortcomings vary but complexity, scalability, and interoperability are common causes. It was found that biometrics are challenging to enroll and deploy when the user's information is stored and retrieved on a central database.
Other shortfalls with 3-factor authentication using cards and access control portals are portability, scalability, and verification the machine-based authentication actually happened. This part of the transaction is usually completely transparent to the user and/or verifying official until the end of the process.
Recently, efforts have been made to incorporate displays into RFID cards and tags. For example, in U.S. Patent App. Pub. No. 2010/0052908 entitled “Transient State Information Display in an RFID Tag,” a display is incorporated into an RFID card to show a transient state such as an age of a product. In the preferred embodiment disclosed in that patent, a card or tag reader provides a current date while the card provides the expiration date of the product. Based on a comparison of those two, an LED is illuminated to reflect the status of the product. The disclosure indicates that a variety of other types of displays may be used and also that the card may be active or passive. In another example, U.S. Patent App. Pub. No. 2010/0079416 entitled “Radio Frequency Identification (RFID), Display Pixel, and Display Panel and Display Apparatus Using RFID Display Pixel” discloses an RFID tag connected to an “RFID pixel” or plurality of “RFID pixels.” Another example is described in U.S. Patent App. Pub. No. 2009/0309736 entitled “Multifunction Contactless Electronic Tag for Goods.”
Additional examples in those disclosed in U.S. Patent Application Publication No. 2012/0181333 entitled “ID Credential with Bi-State Display for Unlocking Devices and U.S. Patent Application Publication No. 2011/0279242 entitled “Batteryless Stored Value Card with Display.
SUMMARY OF THE INVENTION
In a preferred embodiment, the present invention is a system and method for secure peer-to-peer mobile communications using cryptographic mobile unlock tokens in conjunction with mobile devices. The cryptographic mobile unlock tokens of the present invention (the “CK token”) are a new class of token with unique capabilities to perform secure functions for peer-to-peer mobile applications. Each card integrates an entire cryptosystem that would normally be put place, for example, in a mobile phone. Executing these cryptographic based functions entirely in the token have significant operational advantages over the typically memory-only tokens. A more secure, scalable, and lower overall system cost are just a few advantages of the CK token over executing these functions within the smartphone. Of the many uses discussed for the CK token, mobile phone enabling, stored value and medical applications, most have centered on the use of the card in conjunction with a smartphone as the touch point in the transaction.
In a preferred embodiment, the CK tokens are used not only for local transactions but also connected remotely to a similar combination of card and smartphone for an extended variety of uses. This allows the same functions to be performed remotely but with a significant array of added features. Note that the details of the public key transactions (primarily signatures used for authentication) involved in each of these use cases have, for the most part, been omitted for simplicity sake and are described elsewhere. Also note that the key management and initialization processes needed for support are not detailed here but each could take one of several known forms, as noted below.
In a preferred embodiment, the present invention is a method for secure mobile communications between a first user having a first mobile communications device and a first secure token and a second user having a second mobile communications device and a second secure token. The first and second mobile devices each has a near-field communications reader, a user interface and a display. The first secure token has a first secure processor, a first secure non-volatile memory having decryption key information stored therein, a first display, a first power near-field communications antenna and a first data near-field communications antenna. The second secure token similarly has a second secure processor, a second secure non-volatile memory having decryption key information stored therein, a second display, a second power near-field communications antenna and a second data near-field communications antenna. The method is comprised of the steps of performing verification of a first user, transmitting a verification request from the first mobile communications device to the second mobile communications device using the decrypted application on the first mobile communications device, performing verification of a second user, transmitting the encrypted verification reply from the second mobile communications device to the first mobile communications device using the decrypted application on the first mobile communications device; decrypting the encrypted verification reply in the first secure token; verifying in the first security processor an identify of the second user From the decrypted verification reply and displaying on the first display a result of the verification of an identity of the second user.
The step of performing verification of a first user comprises the steps of powering the first secure token with energy received through the first power near-field communications antenna from the near-field communications reader in the first mobile device, enabling the first secure token as a master device relative to the first mobile communications device, enabling the first mobile communications device as a servant device relative to the first mobile communications device, executing a cryptographic mutual challenge response algorithm between the first secure token and the first mobile communications device, unlocking first authentication data of the first user in the secure token in response to successful execution of the cryptographic mutual challenge response algorithm, prompting a first user to enter authentication data through the interface in the first mobile device, transmitting authentication data entered by the first user through the interface in the first mobile device to the first secure token through the first data near-field communications antenna, comparing in the first secure processor authentication data received from the first mobile device with the unlocked authentication data, generating on the first display an indication of a result of the comparing, unlocking a first private decryption key associated in the first secure memory with the first user, transmitting the first private unlock key from the first secure token to the first mobile device through the data near-field communications antenna and decrypting an encrypted application stored on the first mobile communications device using the first private unlock key received from the first secure token.
The step of performing verification of a second user comprises the steps of powering the second secure token with energy received through the second power near-field communications antenna from the near-field communications reader in the second mobile device, enabling the second secure token as a master device relative to the second mobile communications device, enabling the second mobile communications device as a servant device relative to the second mobile communications device, executing a cryptographic mutual challenge response algorithm between the second secure token and the second mobile communications device, unlocking a user's authentication data in the secure token in response to successful execution of the cryptographic mutual challenge response algorithm, prompting a second user to enter authentication data through the interface in the second mobile device, transmitting authentication data entered by the second user through the interface in the second mobile device to the second secure token through the second data near-field communications antenna, comparing in the second secure processor authentication data received from the second mobile device with the unlocked authentication data, generating on the second display an indication of a result of the comparing, unlocking a second private decryption key associated in the second secure memory with the second user, transmitting the second private unlock key from the secure token to the second mobile device through the data near-field communications antenna, decrypting an encrypted application stored on the second mobile communications device using the second private unlock key received from the second secure token and generating in the second secure token an encrypted verification reply.
The authentication data comprises one of a password template and a biometric template, where the biometric template can be any known biometric such as facial recognition, iris recognition, fingerprint or DNA.
The method may further comprise generating and displaying on the first display on the first secure token a status message in response to successful execution of the cryptographic mutual challenge response algorithm between the first secure token and the first mobile communications device.
The method may further comprise any or all of the steps of establishing a secure phone call in response to a verification in said first security processor of an identify of said second user from said decrypted verification reply, generating an audit file in said first secure token in response to said establishing of a secure phone call and storing said generated audit file in said first secure memory, generating an audit file in said second secure token in response to said establishing of a secure phone call and storing said generated audit file in said second secure memory and performing a financial transaction between said first secure token and said second secure token in response to a verification in said first security processor of an identify of said second user from said decrypted verification reply.
Still other aspects, features, and advantages of the present invention are readily apparent from the following detailed description, simply by illustrating a preferable embodiments and implementations. The present invention is also capable of other and different embodiments and its several details can be modified in various obvious respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature, and not as restrictive. Additional objects and advantages of the invention will be set forth in part in the description which follows and in part will be obvious from the description, or may be learned by practice of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description and the accompanying drawings, in which:
FIG. 1A is a block diagram illustrating a preferred embodiment of a cryptographic key (CK) token in accordance with the present invention.
FIG. 1B is a circuit diagram illustrating a front side of a preferred embodiment of a CK token in accordance with the present invention.
FIG. 1C is a circuit diagram illustrating a backside side of a preferred embodiment of a CK token in accordance with the present invention.
FIG. 2 is a diagram illustrating a preferred embodiment of a memory structure of a CK token in accordance with the present invention.
FIG. 3 is a diagram illustrating operation of a preferred embodiment of a system and method in accordance with the present invention.
FIG. 4 is a diagram illustrating operation of a CK token and a mobile device in accordance with a preferred embodiment of the present invention.
FIG. 5 is a flowchart of a token and mobile device unlocking an encrypted application stored on a mobile device in accordance with a preferred embodiment of the present invention.
FIGS. 6 is a flowchart of authentication and authorization of a second user and CK token using a software encrypted voice application on a mobile device in accordance with a preferred embodiment of the present invention.
FIG. 7 is a diagram of a mobile device coupled with a CK token in accordance with a preferred embodiment of the present invention.
FIG. 8 is a protocol exchange between two peer-to-peer users (Alice & Bob) using a software encrypted voice application on a mobile device in accordance with a preferred embodiment of the present invention.
FIG. 9 illustrates a protocol exchange between two peer-to-peer users (Alice & Bob) to securely transfer funds using CK tokens and smartphones in accordance with a preferred embodiment of the present invention.
FIG. 10 is a flow diagram illustrating operation of a CK token and mobile device in accordance with a preferred embodiment of the present invention.
FIG. 11 is a diagram of a mobile device coupled with a CK token performing authentication in accordance with a preferred embodiment of the present invention.
FIG. 12 is a flow diagram illustrating operation of a CK token and a mobile device in accordance with a preferred embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The preferred embodiments of the inventions are described with reference to the drawings. In a preferred embodiment, the present invention provides a system and method for secure peer-to-peer communications and transactions using a plurality of advanced security tokens as cryptographic unlock keys for mobile devices. In the present description, the advanced security token or card is referred to as a “Cryptographic Key Mobile Unlock Token” or “CK Token.”
As shown in FIGS. 1A-1C, the CK token design uses several integrated circuits (IC's) placed on a very thin printed circuit board. The bus controller processor or microcontroller 180 acts a security firewall to prevent unwanted access to the data bus between the cryptographic processor 190, trusted memory 160, display driver 185 and display 150. The antenna 175, 177 can be one power antenna and one data antenna, respectively, but antenna 175 also can be more than one power antenna to optimize the power coupled into the CK token. The card 100 includes interface 110, test and programming port 120 and energy harvesting circuitry 130. Additional memory (not shown) can also be added behind the processor if needed. The CK inlay or PCB inlay 165 is sized to fit into a smartcard 100 and/or label that, for example, may be attached to the back of a smartphone, watch or any other mobile device. The CK token integrates a programmable security processor 190 to be easily adaptable to any mobile device. Since cryptographic security processors require more power than general purpose processors, additional power management and harvesting is required. The CK token designs optimizes power coupling with multiple near-field communications (“NFC”) card antennas, employs an energy harvesting circuitry 130, a uses a more efficient power management unit. These design features will be described in more detail below.
In a preferred embodiment, all of the cryptographic functions required are implemented while parasitically coupling all power through only the mobile device. Having a supplemental battery with the CK token severely limits the life of the token, lowers reliability, and increases costs.
In a preferred embodiment, simple short messages—all alpha numeric—are displayed. The 13-segment display 150 should suffice, but the invention is by no means limited to such a 13-segment display. The majority of the time, a single line message is enough. In some instances, a scroll like message may be required. In all cases these feedback messages are executed only from the secure processor 190. It is for this reason that bus isolation and the CK token acting as master device is mandatory.
One design aspect of the CK token is to ensure enough power is coupled into the CK token to execute the cryptographic functions and bi-state display. The power challenge has many variables that effect the relative powered coupled into the CK token including scanning distance, antenna geometry, speed, angle, and widely varying smartphone NFC transceiver power strength.
A large number of factors affect scan distance performance. One of the most common misconceptions is that the larger the antenna (aerial), the better the performance. When using mobile phones to read NFC tags, this is usually not the case. A larger antenna often requires more energy and therefore the phone needs to be closer. A second factor is the antenna design which in many cases, such as key fobs or wristbands, may be restricted. Further, in much the same way as mobile phones have different battery performances, there are significant differences in chip performance and the energy required to power them. The greater the energy required, the closer the energy source needs to be.
As an example, executing cryptographic functions within the A7005 chip and displaying the results on the CK Token display can draw a maximum of 27 mW of power. This is close to the maximum limits the mobile device reader. To insure safe reliable power margins without employing a costly supplemental on-card battery, the CK token design preferable integrates multiple NFC antennas, power harvesting and power storage circuitry and a software and hardware based power management module.
In a preferred embodiment, the CK design employs two antennas 175, 177. The size, geometry and tuning were all considered. The maximum coupling power was achieved by matching the antenna to the geometry used in the smartphone and employing two (2) NFC on card antennas
Matching Smartphone Antenna Geometry—In an example, a test smartphone was the Samsung S5, so the CK power-coupling antenna was matched in geometry, length, & width to the phone geometry. Antenna alignment between the smartphone and token will also be important. For example, the CK token antenna alignment with the Samsung S5 would configure the smartphone in the landscape mode with the card display revealed from the back for the user to ideally see the results of the secure processing being executed within the CK token.
To perfectly align the card antenna to the mobile device antenna, a simple Velcro™ rubber or plastic guide was attached to the back. This assured optimal antenna alignment for power coupling and ease-of-use.
Other mobile phones or tablets can be pretested to determine where the back-side card guide should be placed. Since the display is designed to be software configured to be orientated to be read facing up or flipped upside down, the card guide can be placed on any 4 sides of the mobile device and be easily read.
The card display could also change orientation to make it readable to the user automatically by using passing the accelerometer sensor data from the mobile device.
Employing two (2) NFC on card antennas—The inductive type antenna of the 14443 NFC standard easily allows multiple antennas without interference to couple more power into the CK token. Multiple antennas also require redundant trimming circuitry adding extra discrete capacitors and resistors. In addition more complex power conditioning circuits are required.
A preferred embodiment of the present invention employs two (2) antennas 175, 177. The thicker NFC antenna 175 on the front side is used only for power rather than modulating the data input/output off the side peak of 13.56 MHz center frequency. On the obverse side, the CK token integrates a second antenna 177 only for the data channel. Using this two-antenna design configuration, both the power coupled into the CK token and the channel data rate will be optimized. As shown in FIG. 4, the two antennas in a CK token or card 405 enables the card to be coupled to a mobile device 411 such as a mobile phone with the mobile device 411 transmitting power 430 to the token or card 405 through the antenna 175 and the token or card 405 and mobile device 411 transmitting data 410 to one another through the antenna 177.
The CK layout includes an analog energy harvesting circuit 130. This circuitry is capable of collecting additional power by pre-charging up to 50 capacitors placed in parallel in the “snake like” structure. Note that one to 50 capacitors can be placed if required. The energy harvesting/charge storage circuitry 130 may not be needed to power and execute required security functions in the CK Token. It is added to lower risk. The energy harvesting circuit 130 can be modified and can also be removed from the PCB design or bypassed.
Power can be managed through software on the CK Token. Powering the segment driver integrated circuit 185 and cryptographic integrated circuit 190 at the same time can result in a power draw that came near or exceeded what the smartphone could produce. If that occurs, a token can lock up or fail to stop communication with the smartphone.
A work around for intermittent token failure was to reprogram the cryptographic firmware so that every processor execution would happen in serial rather than in parallel. For example, if the token required to execute a password match algorithm, the code would serial execute the processes of decrypting the password template from memory, then transferring and decrypting the “live” password form the smartphone, followed by then executing the matching of live vs. template passwords. The matching results would initiate a low powered setting within the crypto processor before powering up the segment driver integrated circuit to write the results to the bi-state display.
With the CK token design, a more complex security architecture can be implemented. Many more cryptographic functions of the cryptographic library can be exercised utilizing the several on-chip crypto math-coprocessors. Since these math coprocessors are not fully characterized with respect to overall chip power draw, integrating the new security architecture will introduce an unknown risk due to possible power consumption. It is for this reason that the CK token has developed a layered design approach to optimize power coupling to the mobile device.
This design uses memory to protect user's data that can be partitioned to separate data containers 224, 225, 226, 230. These memory containers can be encrypted with separate algorithms and cryptographic keys and can be managed by different entities. In addition, the memory containers have attributes fields linked to each container that dictate whether the containers are read/write, what level of user authentication is required, and what level of authorization is required for access. The user's CK's and smartphones, for example, may be initialized and provisioned with cryptographic keys by a separate trusted authority using robust certificate based systems.
As shown in FIG. 2, the security features 210 of the present invention include the secure processor 190 and the additional secure non-volatile memory 160. The additional secure non-volatile memory 160 may include a plurality of secure memory containers 224, 225, 226, 230 for storing pre-defined user access policies including current certificate revocation lists. An additional security component of the secure memory containers is the read only audit file 217. This memory records any transaction between the token and smartphone device and securely writes a log entry into the container. The audit data container cannot be modified and can be used as an independent audit file as a backup to the network audit or as a buffer if the mobile device does not have a connection to the network at that time. It can be downloaded by an authorized security manager.
This CK token has unique advantages when used peer-to-peer between two users. It should be noted the tokens can use any network pathway as shown in FIG. 3. In the example shown in FIG. 3, a first CK token 305 owned by Alice has a display 335. The first CK token 305 is coupled with mobile device 311, which may be, for example, a cell phone, through the antenna in the token. A second CK token 306 owned by Bob has a secure display 336 and is coupled to a mobile device 312 via the antennas in the token 306. Secure signals between the mobile devices 311 and 312 can be made through any electronic mobile communications link such as a router 340, a cell tower 341, Bluetooth 342, data link 343 or any other system 344 ensuring that confidential information can be passed between the two CK's and associated displays without being revealed along the way.
With secure tokens of the present invention coupled with mobile devices such as mobile phones, secure peer-to-peer communications and transactions may be performed. For example, a secure phone application can establish an authenticated link between two Smartphones, perform an exchange of credentials to be displayed on each CK token Secure Display such that each party knows whom they are talking to and the mutual level of authorization between the two.
For example, in a military context if one user holds a SECRET clearance and the other holds a CONFIDENTIAL clearance, they each would then know that a secure conversation could be held at the CONFIDENTIAL level, the highest level of mutual authorization. This operation can also be used to display contents of each participant's secured Card memory on the other's secure display i.e., “wallet or Debit Card contents” in a Stored Value application or secure text in a data transaction. Finally, with the appropriate commands, funding can be securely downloaded from one Smartphone Card to the other using this connection.
A method of a preferred embodiment of the present invention for establishing a secure peer-to-peer connection is described with reference to FIGS. 5-6. Further details are shown in FIGS. 10-12. The process is initiated by User A (Alice) by presenting (502) her CK token to her mobile device, which may be a smartphone or other device. The CK token typically must be placed (504) within approximately 15 cm for the CK token or card to be energized by the NFC reader in the mobile device. Once the CK token is energized (506), the CK token is enabled (508) as the master device and the mobile device is enabled as the slave or servant device (509). A cryptographic mutual challenge response algorithm (MCR) is then executed on the CK token (510) and CMD (512) to validate the mobile device (CMD). If the mutual challenge response is not successful, the process ends (514). If the mutual challenge response is successful, an indication such as an audible sound or visual indication on the mobile device or CK token is generated (516) to advice the user (Alice) that the CK token and mobile device have been authenticated.
In response to this successful authentication, the user's password and/or biometric data are unlocked from the CK token's secure memory (518). The user is then prompted (520) on the mobile device. Such a prompt may be for a password or scan of biometric data (522). Examples of such prompts are shown in FIG. 11. The password or biometric data entered by the User on the mobile device are pre-processed and encrypted (524) and are sent to the CK token, which executes final authentication of the User (526). In the CK token secure processor, the User's entered password or biometric data is compared (528) to the data previously unlocked from the secure memory in the CK token. If the User's password or biometric does not match the unlocked data, a message such as “Incorrect PIN” is displayed on the display of the CK token (530) and the process either ends or the User is prompted to re-enter the data through the mobile device and the final user authentication is repeated. Typically, a User would have some limited number of tries to enter correct data after which the CK token and/or mobile device could be locked either for a period of time or until being re-set through a network. If, on the other hand, the entered password or data matches the unlocked data, a message such as “PIN Matched” or “Authenticated” or other message is displayed (532) on the CK tokens display.
In response to the final authentication of User A being completed, the User's private encryption key is unlocked from the CK token secure memory (534), a key split is generated (536) on the mobile device and the key split is sent (537) to the mobile device. The CK token then generates (538) a session key, which is sent to the mobile device. The User A then selects an encrypted application (“iCON”) on the mobile device. The mobile device then uses the session key to decrypt and open (540) the secure application iCON on the mobile device. When the secure application iCON later is closed (542), the secure application iCON is re-encrypted on the mobile device including any modifications and the CK token's working memory and registers are cleared (546).
The interaction between User A's mobile device and CK token during the authentication and exemplary messages shown on the CK token display are shown in FIG. 10. In Step 1, at the completion of a mutual challenge response, the CK token display indicates “C/R VALID” to indicate to User A that the mutual challenge response has been successful. In the example shown in FIG. 10, User A's password template is unlocked in the CK token in response to the successful mutual challenge response. In Step 2, User A enters the password through a user interface in the mobile device. IF the password is a match with the unlocked password template, the CK token display indicates, for example, “PWD MATCH.” In the CK token, the password is cryptographically hashed with a time stamp and 1st authentication key split is generated. In Step 3, the user is prompted for a biometric scan through the mobile device. Any biometric such as facial recognition, iris scan, fingerprint or voice recognition may be used. The biometric verification is performed in the CK token. If successful, the CK token generates a 2nd authentication key split.
The secure application being unlocked on User A's mobile device could be any of a variety of applications such as a secure Notes application, a secure voice call application, or a secure text message application. The flow chart in FIG. 6 illustrates a continuation of the method of FIG. 5 when the secure application is one requiring secure peer-to-peer communications. Once User A (Alice) opens the secure voice call application on her mobile device, her mobile device sends (602) a verification request to User B's (Bob's) mobile device. The verification request sent from User A to User B includes a public decryption key to initiate the process on User B's mobile device and CK token. User B's CK token must include in its secure memory a private decryption key corresponding to the public key in order to decrypt the request. The private key is pre-programmed into User B's CK token secure memory prior to the exchange between User A and User B.
Upon receipt of the request, User B's mobile device prompts User B to initiate the process shown in FIG. 5 and described above with User's B's CK token and mobile device. Once the secure communications application is decrypted on User B's mobile device at step 540, however, User B's CK token generates (604) an encrypted verification reply and sends that reply to User's A's mobile device. User A's mobile device receives (606) the encrypted verification reply.
Once User A's mobile device receives the verification reply, User's A's CK token uses secure data, such as a private encryption key, to determine whether User B has been verified. User A's CK token will generate on its display a message indicating either that User B has not been verified (610) or that User B has been verified (612). In a system having only one level of security for users, communications between User A and User B can now be established. If the system has multiple levels of security, User A's CK token or mobile device generates a security level request (614) and sends that request to User's B's mobile device, which in turn requests that information from User B's CK token. User B's CK token generates an encrypted security level reply (616), provides that reply to User's B's mobile device, which send it to User A's mobile device. User's A's mobile device receives User B's encrypted security level reply, sends the encrypted reply to User A's CK token, and User A's CK token decrypts (618) that reply. User A's CK token then generates and displays on its display an indication 620, 622, 624 of User B's security level. User A's CK token then compares (626, 628) the received security level of User B to User A's security level attribute for the particular application. If User A's security level does not match User B's security level, User A's CK token displays (630) a message indicating that User A is not authorized to communicate with User B through the secure application. If User A's access level matches User's B's access level, User's A's CK token generates an encrypted desired access level request and through User A's mobile device sends that request to User B's mobile device (632). In response to receiving the encrypted access level request through User B's mobile device, User B's CK token similarly performs steps 618-632 with respect to User A's security level. If User B's CK token determines that the User A's and User B's security levels both match the requested access level, User B's CK token generates a decrypt reply and send that reply through User B's mobile device to User A's mobile device. If that reply indicates a positive match, communications between User A and User B are initiated between User A's and User B's mobile devices (638) with the security level of the call shown on each user's secure display. User A's and User B's CK tokens then write an audit log of the call with the access level to their respective secure memories.
This peer-to-peer secure communication link is shown from a different perspective in FIG. 8 with the different actions in different columns to show where the various action are taking place. Thus, in step one, User A initiates the method, for example for a secure call, by placing her CK token within range of the NFC reader in her mobile device, which starts the mutual authentication between User A's CK token and mobile device. Once the mutual authentication is successfully completed, in step 2 an unlock key is generated on User A's CK token and the encrypted application is opened on User A's mobile device.
With the secure application open on User A's phone a secure link is initiated and established between User A's mobile device and User B's mobile device. In step 4, User B's mobile device rings or provides any other indication of an incoming call. User B placed his CK token within range of the NFC ready in his mobile device and mutual authentication is performed between User B's CK token and User B's mobile device. If that mutual authentication is successfully completed, User B is authenticated and User B's CK token generates an unlock key that is used to open the encrypted speech application on User's B's mobile device. In step 5, User B's mobile devices sends an indicator to User A's mobile device indicated that User B is ready. In response, User A's mobile device send a credential request to User B's mobile device. User B's mobile device and CK token process the credential request presents User B's credentials back to User A's mobile device. In step 7, User A's CK token and mobile device set a transaction security level and send User A's credentials and the set transaction security level to User B's mobile device. User B's CK token determines whether the set transaction security level can be accepted. If it is accepted, in Step 8 the mobile devices are synchronized and the communications begin. As shown in FIG. 7, User A's and User B's mobile devices may show indicators on their screens providing a visual indication of the security level of the call. In step 9, the call is completed and the apps are closed. As described previously, an audit record of the call is created in User A's CK token and is stored in the secure memory in the CK token. An audit file also may be created in User B's CK token and stored in its secure memory. Further, throughout the process, the displays on User A's and User B's CK tokens can show the status of the various stages of the process.
An alternative embodiment for a peer-to-peer mobile funds transfer is shown in FIG. 9. The process is very similar to that shown in FIG. 8 and described above, and in fact Steps 1-3 are the same. At Step 4, however, rather than ringing User B's mobile device, User A's mobile device and CK token send a request for a secure funds transfer to User B. In this instance a funds transfer from User A to User B is shown, but those of skill in the art will understand that the method could be modified such that User A can request a funds transfer from User B instead. In Step 5 of the secure funds transfer example in FIG. 9, the credential request sent by User A's CK token and mobile device includes payment details such as an account number and/or routing number. Once the credential request is successfully process by User B's mobile device and CK token in Step 5, User B's mobile device and CK token send the requested payment information to User A's mobile device and CK token. In Step 7, User A's CK token determines whether User A has sufficient funds available to cover the fund transfer. If no, the transaction ends without payment. If yes, in Step 9 User A's CK token and mobile device verify the transaction and send a message to User B's mobile device and CK token that the transaction has been verified at User A's devices. User B's mobile device and CK token then verify the transaction on User B's end. User B's CK token then stores the received funds in its secure memory and generates and audit record and stores that record in the write-only memory in User's B's CK token memory. User A's CK token likewise creates and audit record of the transaction and stored the record in write-only memory in User A's CK token. In Step 10, the transaction is completed, the applications are close don User A's and User B's mobile devices and any secure files are re-encrypted.
Note that this trust level created with the system and method of the present invention cannot be created using traditional Smartcards since none of these have implemented a Secure Display, the essential and only mechanism for validating the applications described so far. The Secure Display provides the visual guarantees to the user, ones that he can trust.
Remote Transaction Use-Cases
Cross validation of credentials for each party in an end-to-end transaction is very important in remote transactions in which sensitive information may be involved. In the typical secure mobility architectures, cross validation of credentials is managed and executed entirely by the network authority. This server centric approach requires a more complex provisioning, monitoring, and credential validation system. Not only does this security architecture require the server to act as an intricate security component of the solution, it mandates significant trust with the commercial mobile device. Since the CK token of the present invention is a self-contained crypto module, the smartphone coupled to the token or card now has a much reduced security requirement. Additionally, key security functions done by the trusted server like credential validation, authorization, and access privileges are now executed by the token.
In this peer-to-peer scenario, assuming a closed network, each user uses their CK token with a smartphone to authenticate, authorize, and validate each other credentials in lieu of a trusted network service executing these security functions. Each party presents his own credentials in such a way that both can agree on a common level of trust. This allows them to exchange information at that level of trust. The specific trust level is predetermined during enrollment and provisioning of the cryptographic keys. Cryptographically validating the party on the other end and their trust level and their privileges is defined as “authorization.”
Authorization can be statically linked to the user by appending it as an attribute field during the provisioning of the card, phone, and trusted applications. The flow chart shown in FIGS. 6A-6B details how a static authorization process occurs between two different users without communications with any network authority. This example highlights how the CK token can unlock a software encrypted voice application and users on each can securely verify each other and their level of access. This is a new unprecedented peer-to-peer feature of the present invention.
Authorization can also be dynamic. In some instances, the enterprise authority would like to have the ability to ratchet up and down a user or group of mobility users. Each user token still validates the other's credentials and level of trust as in the static case, but then would require reaching back to the network for communication to be enabled. This is a simplistic process for server. The server can now seamlessly overlay any dynamic access rules depending upon variables like, threat level, location of the user, time of day, coalition partner status, and network congestion. Whether static or dynamic authorization is applied, the CK token provides the trusted end point hardware to securely execute these functions.
The many broader uses and features of the CK token with a smartphone can be further explained with these five (5) classes of use-case examples.
Use Case 1: Software Secure Speech App on Smartphone—
Initiating a secure speech session in which each party has at least the same access privileges. In a military scenario the two speakers could determine that one is cleared to the Secret and the other to Confidential, which would mean they could conduct the conversation at the Confidential level. This can be equivalent to each of the speakers recognizing the voice of the other and knowing security levels from previous contacts. The CK token augments this human centric authorization process with an electronic validation based executed on each user's CK tokens.
One key area that makes secure mobile speech more robust is improving the authentication of the user on the other end (and their level of access privileges) with high mathematical certainty before transfer of any sensitive information.
Use Case 2: Student Taking an On-Line Course
After registering with the school for the course, validation of which is contained on the student's CK token, the student could then remotely access the course at any time on-line by presenting his identity credential followed by his course registration credential. Both of these are contained securely on his CK token, residing in the secure memory of the Card and therefore can be totally trusted.
The course instructor examines these remotely via Smartphone, the course admittance requested and granted with a password passed to the student for use in accessing the course on-line. There is no possible fraud in this transaction with the student knowing that he is getting access to an authentic course, which can be proven at a later time via the audit trail on his CK, and the instructor knowing his fee has been paid and that the student is who he says he is. Although this Use Case is not outlined in the flow diagrams like the secure voice, file unlocking, and funds transfers, it requires the exact same set of security functions by the Instructor/student token. In fact, the only difference is the type of private data that is being protected.
Use Case 3: Transferring Funds Using Smartphone
Assured transfer of funds is also possible with the CK token-to-Smartphone-to-CK token configuration. Consider a money transfer from one Debit card to another via this connection. Needed is authentication of the Card holders and authorization for one card to pass the funds and the other card to accept them.
The authorization of the sender involves assurance that the card credit limit has not been exceeded and on the acceptors end that he is the intended recipient. The CK token features of the present invention will allow this transaction to occur in a trusted manner. The CK token has the unique capability to address the authentication, authorization, and electronic verification that correct amount of funds have been transferred to the right person. This Use Case protocol exchange between the smartphones users is detailed further in FIG. 4.
Use Case 4: Verifying Funds Transferred
A variation on the funds transfer application is that the sender can also examine the contents of the acceptor's secure memory to determine need. And since one of the features of the CK token is to maintain an Audit trail, the sender can determine remotely what the acceptor has done with previously received funds, assuming privacy rules have not been violated. This feature also applies to the use of Gift cards and examination of the remaining value of the card.
Use Case 5: Remote Transfer of Authorization to an Agent
Transfer of privileged information can also use these same techniques with the same assurance levels. One application may be a physician using a secure video communication application with a medic in the field. The physician can choose to securely authorize a medical procedure to be done or medication to be administered to the medic (agent). The medic now has been given a specific elevated privilege as an agent of the physician. Again, an audit log is stored on each end user's token to record the transfer of authorization to the agent.
Test results, passwords and bank account numbers and balances are but some of many other examples of this kind of information transfer possible with the CK token and smartphone configuration discussed in this paper as well as ability to display the secure contents of the CK memory.
The foregoing description of the preferred embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiment was chosen and described in order to explain the principles of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto, and their equivalents. The entirety of each of the aforementioned documents is incorporated by reference herein.

Claims (7)

What is claimed is:
1. A method for secure mobile communications between a first user having a first mobile communications device and a first secure token and a second user having a second mobile communications device and a second secure token, wherein said first and second mobile devices each has a near-field communications reader, a user interface and a display, said first secure token has a first secure processor, a first secure non-volatile memory having decryption key information stored therein, a first display, a first power near-field communications antenna and a first data near-field communications antenna and said second secure token has a second secure processor, a second secure non-volatile memory having decryption key information stored therein, a second display, a second power near-field communications antenna and a second data near-field communications antenna, comprising the steps of:
performing verification of a first user comprising the steps of:
powering said first secure token with energy received through said first power near-field communications antenna from said near-field communications reader in said first mobile device;
enabling said first secure token as a master device relative to said first mobile communications device;
enabling said first mobile communications device as a servant device relative to said first mobile communications device;
executing a cryptographic mutual challenge response algorithm between said first secure token and said first mobile communications device;
unlocking first authentication data of said first user in said first secure token in response to successful execution of said cryptographic mutual challenge response algorithm;
prompting a first user to enter authentication data through said interface in said first mobile device;
transmitting authentication data entered by said first user through said interface in said first mobile device to said first secure token through said first data near-field communications antenna;
comparing in said first secure processor authentication data received from said first mobile device with said unlocked authentication data;
generating on said first display an indication of a result of said comparing;
unlocking a first private decryption key associated in said first secure memory with said first user;
transmitting said first private unlock key from said first secure token to said first mobile device through said data near-field communications antenna;
decrypting an encrypted application stored on said first mobile communications device using said first private unlock key received from said first secure token;
transmitting a verification request from said first mobile communications device to said second mobile communications device using said decrypted application on said first mobile communications device;
performing verification of a second user comprising the steps of:
powering said second secure token with energy received through said second power near-field communications antenna from said near-field communications reader in said second mobile device;
enabling said second secure token as a master device relative to said second mobile communications device;
enabling said second mobile communications device as a servant device relative to said second mobile communications device;
executing a cryptographic mutual challenge response algorithm between said second secure token and said second mobile communications device;
unlocking a user's authentication data in said second secure token in response to successful execution of said cryptographic mutual challenge response algorithm;
prompting a second user to enter authentication data through said interface in said second mobile device;
transmitting authentication data entered by said second user through said interface in said second mobile device to said second secure token through said second data near-field communications antenna;
comparing in said second secure processor authentication data received from said second mobile device with said unlocked authentication data;
generating on said second display an indication of a result of said comparing;
unlocking a second private decryption key associated in said second secure memory with said second user;
transmitting said second private unlock key from said second secure token to said second mobile device through said data near-field communications antenna; and
decrypting an encrypted application stored on said second mobile communications device using said second private unlock key received from said second secure token;
generating in said second secure token an encrypted verification reply;
transmitting said encrypted verification reply from said second mobile communications device to said first mobile communications device using said decrypted application on said first mobile communications device;
decrypting said encrypted verification reply in said first secure token;
verifying in said first security processor an identify of said second user from said decrypted verification reply;
displaying on said first display a result of said verification of an identity of said second user.
2. The method for secure mobile communications according to claim 1 wherein said authentication data comprises one of a password template and a biometric template.
3. The method for secure mobile communications according to claim 1 further comprising generating and displaying on said first display on said first secure token a status message in response to successful execution of said cryptographic mutual challenge response algorithm between said first secure token and said first mobile communications device.
4. The method for secure mobile communications according to claim 1, further comprising the step of establishing a secure phone call in response to a verification in said first security processor of an identify of said second user from said decrypted verification reply.
5. The method for secure mobile communications according to claim 4, further comprising the step of generating an audit file in said first secure token in response to said establishing of a secure phone call and storing said generated audit file in said first secure memory.
6. The method for secure mobile communications according to claim 5, further comprising the step of generating an audit file in said second secure token in response to said establishing of a secure phone call and storing said generated audit file in said second secure memory.
7. The method for secure mobile communications according to claim 1, further comprising the step of performing a financial transaction between said first secure token and said second secure token in response to a verification in said first security processor of an identify of said second user from said decrypted verification reply.
US15/136,733 2015-04-22 2016-04-22 Method and system for secure peer-to-peer mobile communications Active US9674705B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/136,733 US9674705B2 (en) 2015-04-22 2016-04-22 Method and system for secure peer-to-peer mobile communications

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562151054P 2015-04-22 2015-04-22
US15/136,733 US9674705B2 (en) 2015-04-22 2016-04-22 Method and system for secure peer-to-peer mobile communications

Publications (2)

Publication Number Publication Date
US20160316367A1 US20160316367A1 (en) 2016-10-27
US9674705B2 true US9674705B2 (en) 2017-06-06

Family

ID=57148334

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/136,733 Active US9674705B2 (en) 2015-04-22 2016-04-22 Method and system for secure peer-to-peer mobile communications

Country Status (1)

Country Link
US (1) US9674705B2 (en)

Cited By (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10110568B2 (en) * 2016-02-03 2018-10-23 Dell Products, Lp Keyless access to laptop
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607216B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10615981B1 (en) 2018-10-02 2020-04-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10630653B1 (en) 2018-10-02 2020-04-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10701560B1 (en) 2019-10-02 2020-06-30 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10783519B2 (en) 2018-10-02 2020-09-22 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10797882B2 (en) 2018-10-02 2020-10-06 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US20210150506A1 (en) * 2018-01-16 2021-05-20 Capital One Services, Llc Peer-to-peer payment systems and methods
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11071050B2 (en) 2018-01-15 2021-07-20 Telefonaktiebolaget Lm Ericsson (Publ) Network function instance selection
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US20230123241A1 (en) * 2020-02-24 2023-04-20 Zhejiang Geely Holding Group Co., Ltd Security authentication method and apparatus thereof, and electronic device
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US11974127B2 (en) 2021-08-18 2024-04-30 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9767333B1 (en) * 2011-02-17 2017-09-19 Impinj, Inc. RFID tag and reader authentication by trusted authority
US9690949B1 (en) 2012-02-15 2017-06-27 Impinj, Inc. Proxy-based reader authentication by trusted authority
FR3028639B1 (en) * 2014-11-17 2016-12-23 Oberthur Technologies METHOD FOR SECURING A PAYMENT TOKEN
US20210158919A1 (en) * 2016-04-26 2021-05-27 Express Scripts Strategic Development, Inc. Medical processing systems and methods
US10055738B2 (en) * 2016-11-04 2018-08-21 BBPOS Limited System and methods to prevent unauthorized usage of card readers
US10212157B2 (en) * 2016-11-16 2019-02-19 Bank Of America Corporation Facilitating digital data transfers using augmented reality display devices
US10853474B2 (en) * 2017-07-31 2020-12-01 Dell Products, L.P. System shipment lock
US10216241B1 (en) 2017-08-02 2019-02-26 Dell Products, Lp Method and apparatus for securing communication of instructions to manage antenna power output
US10726219B1 (en) * 2017-11-28 2020-07-28 Wells Fargo Bank, N.A. Data-securing chip card construction
JP7115556B2 (en) * 2018-10-19 2022-08-09 日本電信電話株式会社 Certification and authorization system and certification and authorization method
US11275820B2 (en) * 2019-03-08 2022-03-15 Master Lock Company Llc Locking device biometric access
CN110912578A (en) * 2019-11-28 2020-03-24 耒阳市旗心电子科技有限公司 Communication method of portable communication equipment
JP2021141534A (en) * 2020-03-09 2021-09-16 パナソニックIpマネジメント株式会社 In-vehicle device and in-vehicle system
US11562746B2 (en) * 2020-05-15 2023-01-24 Harris Global Communications, Inc. System and methods for speaker identification, message compression and/or message replay in a communications environment
WO2022093221A1 (en) * 2020-10-28 2022-05-05 Hewlett-Packard Development Company, L.P. Authorization audit
US11606696B2 (en) 2021-06-04 2023-03-14 Kyndryl, Inc. Security mechanism for wireless authentication devices
US20230188515A1 (en) * 2021-12-10 2023-06-15 International Business Machines Corporation Securely preserving prior security tokens for recall
WO2024079520A1 (en) * 2022-10-10 2024-04-18 Linxens Holding Dual-interface smartcard with lighting element

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100088188A1 (en) * 2008-10-06 2010-04-08 Pradeep Kumar Systems, methods, and computer readable media for payment and non-payment virtual card transfer between mobile devices
US20110185183A1 (en) * 2010-01-27 2011-07-28 Ricoh Company, Ltd. Peripheral device, network system, communication processing method
US20120159148A1 (en) * 2010-12-17 2012-06-21 Google Inc. Local trusted services manager for a contactless smart card
US20120321084A1 (en) * 2011-06-17 2012-12-20 Le Saint Eric F Revocation status using other credentials
US20120323717A1 (en) * 2011-06-16 2012-12-20 OneID, Inc. Method and system for determining authentication levels in transactions
US20130152185A1 (en) * 2011-12-09 2013-06-13 Research In Motion Limited Transaction provisioning for mobile wireless communications devices and related methods
US20130191232A1 (en) * 2012-01-23 2013-07-25 Bank Of America Corporation Enhanced mobile application for assisting users at a point of transaction
US20130200146A1 (en) * 2012-02-03 2013-08-08 Ali Minaei Moghadam Adding card to mobile/cloud wallet using nfc
US20130232082A1 (en) * 2012-03-05 2013-09-05 Mark Stanley Krawczewicz Method And Apparatus For Secure Medical ID Card
US20140149746A1 (en) * 2012-11-28 2014-05-29 Arnold Yau Method and system of providing authentication of user access to a computer resource on a mobile device
US20140207680A1 (en) * 2011-10-17 2014-07-24 Capital One Financial Corporation System and method for providing a mobile wallet shopping companion application
US8880027B1 (en) * 2011-12-29 2014-11-04 Emc Corporation Authenticating to a computing device with a near-field communications card
US20150012437A1 (en) * 2013-07-03 2015-01-08 Brandom Authentication system and method using mobile terminal
US20160125180A1 (en) * 2013-12-12 2016-05-05 Intel Corporation Near Field Communication Authentication Mechanism
US20160335619A1 (en) * 2012-07-09 2016-11-17 Rafeeq CE Systems and methods for enabling secure transactions with mobile devices

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100088188A1 (en) * 2008-10-06 2010-04-08 Pradeep Kumar Systems, methods, and computer readable media for payment and non-payment virtual card transfer between mobile devices
US20110185183A1 (en) * 2010-01-27 2011-07-28 Ricoh Company, Ltd. Peripheral device, network system, communication processing method
US20120159148A1 (en) * 2010-12-17 2012-06-21 Google Inc. Local trusted services manager for a contactless smart card
US20120323717A1 (en) * 2011-06-16 2012-12-20 OneID, Inc. Method and system for determining authentication levels in transactions
US20120321084A1 (en) * 2011-06-17 2012-12-20 Le Saint Eric F Revocation status using other credentials
US20140207680A1 (en) * 2011-10-17 2014-07-24 Capital One Financial Corporation System and method for providing a mobile wallet shopping companion application
US20130152185A1 (en) * 2011-12-09 2013-06-13 Research In Motion Limited Transaction provisioning for mobile wireless communications devices and related methods
US8880027B1 (en) * 2011-12-29 2014-11-04 Emc Corporation Authenticating to a computing device with a near-field communications card
US20130191232A1 (en) * 2012-01-23 2013-07-25 Bank Of America Corporation Enhanced mobile application for assisting users at a point of transaction
US20130200146A1 (en) * 2012-02-03 2013-08-08 Ali Minaei Moghadam Adding card to mobile/cloud wallet using nfc
US20130232082A1 (en) * 2012-03-05 2013-09-05 Mark Stanley Krawczewicz Method And Apparatus For Secure Medical ID Card
US20160335619A1 (en) * 2012-07-09 2016-11-17 Rafeeq CE Systems and methods for enabling secure transactions with mobile devices
US20140149746A1 (en) * 2012-11-28 2014-05-29 Arnold Yau Method and system of providing authentication of user access to a computer resource on a mobile device
US20150012437A1 (en) * 2013-07-03 2015-01-08 Brandom Authentication system and method using mobile terminal
US20160125180A1 (en) * 2013-12-12 2016-05-05 Intel Corporation Near Field Communication Authentication Mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Ngu, Matthew et al., "How Secure are Contactless Payment Systems?", RSAConference2015 Apr. 20-24, 2015, pp. 1-44. *

Cited By (153)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10110568B2 (en) * 2016-02-03 2018-10-23 Dell Products, Lp Keyless access to laptop
US11792720B2 (en) 2018-01-15 2023-10-17 Telefonaktiebolaget Lm Ericsson (Publ) Network function instance selection
US11071050B2 (en) 2018-01-15 2021-07-20 Telefonaktiebolaget Lm Ericsson (Publ) Network function instance selection
US20210150506A1 (en) * 2018-01-16 2021-05-20 Capital One Services, Llc Peer-to-peer payment systems and methods
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10878651B2 (en) 2018-06-21 2020-12-29 Capital One Services, Llc Systems and methods for secure read-only authentication
US11102007B2 (en) 2018-10-02 2021-08-24 Capital One Services, Llc Contactless card emulation system and method
US11301848B2 (en) 2018-10-02 2022-04-12 Capital One Services, Llc Systems and methods for secure transaction approval
US11924188B2 (en) 2018-10-02 2024-03-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11843700B2 (en) 2018-10-02 2023-12-12 Capital One Services, Llc Systems and methods for email-based card activation
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11843698B2 (en) 2018-10-02 2023-12-12 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US11804964B2 (en) 2018-10-02 2023-10-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11790187B2 (en) 2018-10-02 2023-10-17 Capital One Services, Llc Systems and methods for data transmission using contactless cards
US11784820B2 (en) 2018-10-02 2023-10-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US11770254B2 (en) 2018-10-02 2023-09-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607216B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10615981B1 (en) 2018-10-02 2020-04-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10630653B1 (en) 2018-10-02 2020-04-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11728994B2 (en) 2018-10-02 2023-08-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11699047B2 (en) 2018-10-02 2023-07-11 Capital One Services, Llc Systems and methods for contactless card applet communication
US11658997B2 (en) 2018-10-02 2023-05-23 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11610195B2 (en) 2018-10-02 2023-03-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11563583B2 (en) 2018-10-02 2023-01-24 Capital One Services, Llc Systems and methods for content management using contactless cards
US11544707B2 (en) 2018-10-02 2023-01-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11502844B2 (en) 2018-10-02 2022-11-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11469898B2 (en) 2018-10-02 2022-10-11 Capital One Services, Llc Systems and methods for message presentation using contactless cards
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10778437B2 (en) 2018-10-02 2020-09-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11444775B2 (en) 2018-10-02 2022-09-13 Capital One Services, Llc Systems and methods for content management using contactless cards
US10783519B2 (en) 2018-10-02 2020-09-22 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10797882B2 (en) 2018-10-02 2020-10-06 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11438311B2 (en) 2018-10-02 2022-09-06 Capital One Services, Llc Systems and methods for card information management
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11438164B2 (en) 2018-10-02 2022-09-06 Capital One Services, Llc Systems and methods for email-based card activation
US11423452B2 (en) 2018-10-02 2022-08-23 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11349667B2 (en) 2018-10-02 2022-05-31 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US11341480B2 (en) 2018-10-02 2022-05-24 Capital One Services, Llc Systems and methods for phone-based card activation
US11336454B2 (en) 2018-10-02 2022-05-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10880327B2 (en) 2018-10-02 2020-12-29 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11321546B2 (en) 2018-10-02 2022-05-03 Capital One Services, Llc Systems and methods data transmission using contactless cards
US10887106B2 (en) 2018-10-02 2021-01-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11129019B2 (en) 2018-10-02 2021-09-21 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US11297046B2 (en) 2018-10-02 2022-04-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11232272B2 (en) 2018-10-02 2022-01-25 Capital One Services, Llc Systems and methods for contactless card applet communication
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US11233645B2 (en) 2018-10-02 2022-01-25 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US10965465B2 (en) 2018-10-02 2021-03-30 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US11195174B2 (en) 2018-10-02 2021-12-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11182784B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US11182785B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for authorization and access to services using contactless cards
US11144915B2 (en) 2018-10-02 2021-10-12 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards using risk factors
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11456873B2 (en) 2018-10-02 2022-09-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10783736B1 (en) 2019-03-20 2020-09-22 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US10701560B1 (en) 2019-10-02 2020-06-30 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US11638148B2 (en) 2019-10-02 2023-04-25 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US11924635B2 (en) * 2020-02-24 2024-03-05 Zhejiang Geely Holding Group Co., Ltd Security authentication method and apparatus thereof, and electronic device
US20230123241A1 (en) * 2020-02-24 2023-04-20 Zhejiang Geely Holding Group Co., Ltd Security authentication method and apparatus thereof, and electronic device
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11562346B2 (en) 2020-04-30 2023-01-24 Capital One Services, Llc Contactless card with multiple rotating security keys
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US11270291B2 (en) 2020-04-30 2022-03-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11922417B2 (en) 2021-01-28 2024-03-05 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11687930B2 (en) 2021-01-28 2023-06-27 Capital One Services, Llc Systems and methods for authentication of access tokens
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11848724B2 (en) 2021-03-26 2023-12-19 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US20220311475A1 (en) 2021-03-26 2022-09-29 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US11974127B2 (en) 2021-08-18 2024-04-30 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards

Also Published As

Publication number Publication date
US20160316367A1 (en) 2016-10-27

Similar Documents

Publication Publication Date Title
US9674705B2 (en) Method and system for secure peer-to-peer mobile communications
US11664997B2 (en) Authentication in ubiquitous environment
US11895225B2 (en) Systems and methods for trustworthy electronic authentication using a computing device
EP2648163B1 (en) A personalized biometric identification and non-repudiation system
US8966268B2 (en) Strong authentication token with visual output of PKI signatures
US9251513B2 (en) Stand-alone secure PIN entry device for enabling EMV card transactions with separate card reader
US6850916B1 (en) Portable electronic charge and authorization devices and methods therefor
AU2015255884B2 (en) Establishment of a secure session between a card reader and a mobile device
US20120181333A1 (en) Secure ID Credential With Bi-State Display For Unlocking Devices
KR20160070061A (en) Apparatus and Methods for Identity Verification
EP3582166A1 (en) Method and system to create a trusted record or message and usage for a secure activation or strong customer authentication
AU2018214800A1 (en) Methods and systems for securely storing sensitive data on smart cards
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
US20190028470A1 (en) Method For Verifying The Identity Of A Person
US20190325427A1 (en) Contactless device and method for generating a unique temporary code
KR200401587Y1 (en) Smart Card leader system for the one time password creation
WO2014146684A1 (en) An authentication system and method
US20230086015A1 (en) Ic card asymmetric labelling system and ic card built-in password input system
KR100727866B1 (en) Smart Card leader system for the one time password creation
CN117981274A (en) Remote identity interaction
TW201947454A (en) Secure enrolment of biometric data

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: TOCREO LABS, L.L.C., MARYLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROSE, KENNETH HUGH;KRAWCZEWICZ, MARK STANLEY;REEL/FRAME:043515/0116

Effective date: 20170906

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: SURCHARGE FOR LATE PAYMENT, SMALL ENTITY (ORIGINAL EVENT CODE: M2554); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4